Additional Information
Here are some other things to consider when dealing with possible scams:
- While you can’t control whether an email address has been hacked, you should use proven processes to ensure and verify the validity of high-dollar requests. Additional verification would have revealed that the client did not actually request that funds be transferred.
- Question email requests to transfer money that also say the sender will be unavailable for a period of time to confirm the transaction. Fraudsters depend on speed, and count on employees to not think too much about an individual transaction.
- Follow procedures. You should try to verify the accuracy of any request to transfer money or personally identifiable information (PII) by phone or email.